This might have slipped under the radar these past few days, but a 9.8 RCE in Exim (on many, many mail servers) that does not require authentication is bad bad bad.
This might have slipped under the radar these past few days, but a 9.8 RCE in Exim (on many, many mail servers) that does not require authentication is bad bad bad.
More info, from https://seclists.org/oss-sec/2023/q3/254
Exim4 MTA CVEs assigned from ZDI
From: Heiko Schlittermann <hs () nodmarc schlittermann de>
Date: Fri, 29 Sep 2023 18:06:11 +0200
Hello Exim users,
the ZDI assigned multiple CVEs to the Exim-MTA and published them recently:
CVE Link Exim-Bug
--------------+---------------------------------------------------------+-----
CVE-2023-42114 https://www.zerodayinitiative.com/advisories/ZDI-23-1468/ 3001 fixed
CVE-2023-42115 https://www.zerodayinitiative.com/advisories/ZDI-23-1469/ 2999 fixed
CVE-2023-42116 https://www.zerodayinitiative.com/advisories/ZDI-23-1470/ 3000 fixed
CVE-2023-42117 https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
CVE-2023-42118 https://www.zerodayinitiative.com/advisories/ZDI-23-1472/
CVE-2023-42119 https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
The ZDI contacted us in June 2022. We asked about details but didn't get answers we were able to work with.
Next contact with ZDI was in May 2023. Right after this contact we created project bug tracker for 3 of the 6 issues. 2 high scored of them are fixed (OOB access). A minor scored (info leak) is fixed too.
Fixes are available in a protected repository and are ready to be
applied by the distribution maintainers.
The remaining issues are debatable or miss information we need to fix them.
We're more than happy to provide fixes for all issues as soon as we receive detailed information.
Best regards from Dresden/Germany
Viele Grรผรe aus Dresden
Heiko Schlittermann
--
SCHLITTERMANN.de ---------------------------- internet & unix support -
Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}:
@briankrebs thanks for the follow up. A bit scary in the sausage software factory as outlined in the links.
I blindly did an update on all my servers and was a bit surprised that I didn't see any exim patches and now I know why. Then again I don't run inbound email on any servers as life is too short to run your own email server in this spam world.
That timeline... ๐
06/14/22 โ ZDI reported the vulnerability to the vendor.
*silence*
04/25/23 โ The vendor asked us to re-send the reports.
*silence*
09/25/23 โ ZDI asked for an update and informed the vendor that we intend to publish the case as a zero-day advisory on 09/27/23.
s/days/months/
@briankrebs
> Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.
Ouch!
Clearly retrocomputing is getting out of hand; now weโre bringing back classic CVEs from the 90s? smh ๐